IT Services
Contract
United States
Norfolk
Needed
ACT-SACT
EXPERIENCE AND EDUCATION:
Essential Qualifications/Experience:
· Minimum 4 years of experience with containerization and orchestration (Docker, Kubernetes, OpenShift)
· Minimum 4 years of experience in designing and maintaining CI/CD pipelines with automated testing and security validation
· Experience with Infrastructure as Code (Terraform, Ansible, Helm, Pulumi)
· Experience deploying and securing workloads in hybrid/public cloud environments (AWS, Azure, Google Cloud, VMware, OpenStack)
· Experience implementing site reliability engineering and observability practices (Prometheus, Grafana, ELK/Loki, OpenTelemetry)
· Experience implementing scalable, resilient, high-throughput systems and service-oriented architecture
· Experience delivering capabilities in Agile/DevSecOps environments (Scrum, SAFe, Kanban)
· Experience designing and managing secure networking and service mesh (TLS, Istio, Linkerd, API gateways)
· Experience applying zero-trust principles and compliance automation (OPA, Kyverno, SBOM, CIS benchmarks)
· Experience managing secrets and access policies using modern IAM solutions (Vault, AWS KMS, Azure Key Vault, RBAC/ABAC)
DUTIES/ROLE:
· Deploy and operate containerized services using orchestration frameworks to ensure scalability and resilience
· Automate infrastructure through Infrastructure as Code (IaC) to provide consistent and repeatable environments
· Deploy and monitor workloads in cloud environments (AWS, Azure, Google Cloud, VMware, OpenStack)
· Implement site reliability engineering (SRE) and observability practices to ensure resilience, monitoring, logging, metrics, and distributed tracing
· Support high-throughput and service-oriented architectures, ensuring resilient and scalable deployments
· Deliver incremental capabilities in Agile and DevSecOps environments following frameworks such as Scrum, SAFe, or Kanban
· Design and manage secure networking and service meshes (TLS, Istio, Linkerd, API gateways) to ensure encrypted and reliable service-to-service communication
· Apply zero-trust principles and compliance automation to enforce security policies and validate system compliance
· Manage identity and access using secure methods for secrets, tokens, certificates, and least privilege access control
All the mandatory requirements have to be met in order to apply.